US10129387B2 - Terminal anti-lost method and terminal - Google Patents

Terminal anti-lost method and terminal Download PDF

Info

Publication number
US10129387B2
US10129387B2 US15/540,863 US201415540863A US10129387B2 US 10129387 B2 US10129387 B2 US 10129387B2 US 201415540863 A US201415540863 A US 201415540863A US 10129387 B2 US10129387 B2 US 10129387B2
Authority
US
United States
Prior art keywords
terminal
instruction
screen state
lock screen
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US15/540,863
Other versions
US20170346939A1 (en
Inventor
Zhihong Wang
Mingxing CAI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Assigned to HUAWEI TECHNOLOGIES CO., LTD. reassignment HUAWEI TECHNOLOGIES CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CAI, Mingxing, WANG, ZHIHONG
Publication of US20170346939A1 publication Critical patent/US20170346939A1/en
Application granted granted Critical
Publication of US10129387B2 publication Critical patent/US10129387B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/72577
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the present disclosure relates to the communications field, and in particular, to a terminal anti-lost method and a terminal.
  • a terminal device such as a mobile phone or a tablet computer is often lost or stolen, for example, stolen in a subway, on a bus, or at a densely populated place.
  • an anti-lost device may be connected to the terminal by using Bluetooth.
  • the anti-lost device may ring, and the user can discover in a timely manner that the terminal is lost.
  • Embodiments of the present disclosure provide a terminal anti-lost method and a terminal, to resolve a problem that a lost terminal is difficult to find when a user discovers in a timely manner that the terminal is lost, rapidly lock a position of the terminal, and increase a probability of finding the lost terminal by the user.
  • a first aspect of the embodiments of the present disclosure provides a terminal anti-lost method, including: detecting, by a terminal when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a downlink carrier signal; and skipping executing, by the terminal, the specific instruction when detecting that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
  • the specific instruction includes: a switch-off instruction, a mute instruction, a volume decreasing instruction, or a subscriber identity module (SIM) card removing instruction.
  • SIM subscriber identity module
  • the method further includes: when the terminal in the lock screen state detects headset insertion, deactivating, by the terminal, the headset insertion and keeping the loudspeaker effective.
  • the method further includes: prompting, by the terminal, a user to cancel the lock screen state of the terminal; and if the lock screen state of the terminal is not canceled in a first predetermined time, triggering the step of the deactivating, by the terminal, the headset insertion and keeping the loudspeaker effective.
  • the method further includes: prompting, by the terminal, a user to cancel the lock screen state of the terminal; and if the lock screen state of the terminal is not canceled in a second predetermined time, triggering the step of the skipping executing, by the terminal, the specific instruction.
  • the method further includes: obtaining, by the terminal, a biometric feature of a current user; and uploading the obtained biometric feature to a preconfigured server, and/or sending the obtained biometric feature to another terminal.
  • the method further includes: obtaining, by the terminal, an environmental parameter of an environment in which a current user is located; and uploading the obtained environmental parameter to a preconfigured server, and/or sending the obtained environmental parameter to another terminal.
  • the method further includes: when the lock screen state of the terminal is canceled, stopping playing, by the terminal, the alarm tone.
  • a second aspect of the embodiments of the present disclosure provides a terminal, including: a detection module configured to detect, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and an alarm module configured to skip executing the specific instruction when the detection module detects that the terminal is in the lock screen state, and control the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
  • the specific instruction includes: a switch-off instruction, a mute instruction, a volume decreasing instruction, or a SIM-card removing instruction.
  • the terminal further includes: a deactivation module configured to: when headset insertion is detected in the lock screen state, deactivate the headset insertion and keep the loudspeaker effective.
  • the deactivation module includes: a prompt unit configured to prompt, when the inserted headset is detected in the lock screen state, a user to cancel the lock screen state of the terminal; and a deactivation unit configured to: when the lock screen state is not canceled in a first predetermined time after the prompt unit prompts to cancel the lock screen state, deactivate the headset insertion and keep the loudspeaker effective.
  • the terminal further includes: a prompt module configured to prompt, before the alarm module skips executing the instruction, a user to cancel the lock screen state of the terminal; and a trigger module configured to trigger the alarm module when the lock screen state is not canceled in a second predetermined time after the prompt module prompts to cancel the lock screen state.
  • the terminal further includes: a first obtaining module configured to obtain a biometric feature of a current user when the alarm module skips executing the specific instruction; and a first sending module configured to upload the biometric feature obtained by the first module to a preconfigured server, and/or send the obtained biometric feature to another terminal.
  • the terminal further includes: a second obtaining module configured to obtain, when the alarm module skips executing the specific instruction, an environmental parameter of an environment in which a current user is located; and a second sending module configured to upload the environmental parameter obtained by the first module to a preconfigured server, and/or send the obtained environmental parameter to another terminal.
  • the terminal further includes: a stop module configured to stop playing the alarm tone when the alarm module plays the alarm tone by using the loudspeaker and when the lock screen state is canceled.
  • a third aspect of the embodiments of the present disclosure provides a terminal, including: an input apparatus, an output apparatus, a processor, and a memory; where the input apparatus, the output apparatus, and the memory are connected to the processor; the output apparatus includes a loudspeaker; and by invoking an operation instruction stored in the memory, the processor is configured to perform the following steps: detecting, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and skipping executing the specific instruction when detecting that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
  • the specific instruction includes a switch-off instruction, a mute instruction, a volume decreasing instruction, or a SIM-card removing instruction.
  • the processor is further configured to perform the following step: when headset insertion is detected in the lock screen state, deactivating the headset insertion and keeping the loudspeaker effective.
  • the processor is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before deactivating the headset insertion; and if the lock screen state is not canceled in a first predetermined time, triggering the step of the deactivating the headset insertion.
  • the processor is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before skipping executing the specific instruction; and if the lock screen state is not canceled in a second predetermined time, triggering the step of the skipping executing the specific instruction.
  • the terminal further includes a transmitter; and the processor is further configured to perform the following steps: obtaining a biometric feature of a current user; and instructing the transmitter to upload the obtained biometric feature to a preconfigured server, and/or instructing the transmitter to send the obtained biometric feature to another terminal.
  • the terminal further includes a transmitter; and the processor is further configured to perform the following steps: obtaining an environmental parameter of an environment in which a current user is located; and instructing the transmitter to upload the obtained environmental parameter to a preconfigured server, and/or instructing the transmitter to send the obtained environmental parameter to another terminal.
  • the processor is further configured to perform the following step: when the alarm tone is played by using the loudspeaker, stopping playing the alarm tone if the lock screen state is canceled.
  • the terminal when the terminal receives the specific instruction, the terminal first detects whether the terminal is currently in the lock screen state.
  • the specific instruction represents the instruction of controlling the terminal to decrease volume and/or the instruction of preventing the terminal from receiving a carrier signal.
  • the terminal skips executing the instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
  • the user may determine a position of the lost terminal according to a position of the ringing alarm tone, so as to find the lost terminal. If no alarm tone is ringing nearby, because the terminal in the lock screen state skips executing the instruction of controlling the terminal to decrease volume and/or preventing the terminal from receiving a carrier signal, the user may determine a position of the lost terminal by calling the terminal and searching for a nearby terminal that generates a called ringtone, so as to find the lost terminal. Therefore, a probability of finding a lost terminal by a user is increased when the user discovers in a timely manner that the terminal is lost.
  • FIG. 1 is a schematic flowchart of a terminal anti-lost method according to an embodiment of the present disclosure
  • FIG. 2 is another schematic flowchart of a terminal anti-lost method according to an embodiment of the present disclosure
  • FIG. 3 is another schematic flowchart of a terminal anti-lost method according to an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 5 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 6 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 7 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 8 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 9 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 10 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 11 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • carrier signal is used to represent a signal that is delivered by a base station to a terminal and that is used to call the terminal. If the terminal cannot receive the carrier signal, when another terminal calls the terminal, the terminal cannot receive the call, and does not play a called ringtone.
  • speaker represents a speaker that is used to loudly play a sound.
  • an embodiment of the terminal anti-lost method in the embodiments of the present disclosure includes the following steps.
  • a terminal When a terminal receives a specific instruction, the terminal detects whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal.
  • a thief may send a type of specific instruction to the terminal after getting the terminal, and the type of specific instruction may be used to control the terminal to decrease volume or prevent the terminal from receiving a carrier signal.
  • the terminal may first detect whether the terminal is currently in a lock screen state, instead of immediately executing the received specific instruction.
  • the instruction of controlling the terminal to decrease volume may be a mute instruction or a volume decreasing instruction
  • the instruction of preventing the terminal from receiving a carrier signal may be a switch-off instruction or a SIM-card removing instruction. It may be understood that there may be another instruction of controlling the terminal to decrease volume or preventing the terminal from receiving a carrier signal. This is not limited herein.
  • the lock screen state is different from a black screen state.
  • the lock screen state may be a black screen state, or may not be a black screen state, and the black screen state may be a lock screen state, or may not be a lock screen state.
  • the black screen state merely indicates that a screen is not lit up, and any operation may cancel the black screen state and light up the screen.
  • the lock screen state cannot be canceled by any operation, and can be canceled only in a preset unlocking manner.
  • the terminal skips executing the specific instruction when detecting that the terminal is in the lock screen state, and controls the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
  • the terminal When detecting that the terminal is in the lock screen state, the terminal skips executing the received specific instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
  • Manner 1 Control the terminal to increase the volume, but not play the alarm tone by using the loudspeaker.
  • Manner 2 Control the terminal not to increase the volume, but play the alarm tone by using the loudspeaker.
  • Manner 3 Control the terminal to increase the volume, and play the alarm tone by using the loudspeaker.
  • any one may be selected. This is not limited herein.
  • the alarm tone may be a commonly-used alert sound, or may be a specific sound defined by the user, such as a specific song or an animal sound, so that the user identifies in a timely manner a position of the ringing alarm tone.
  • the user can determine in a timely manner a position of the lost terminal and find the lost terminal.
  • the terminal does not execute the received specific instruction and increases the terminal volume.
  • the user may directly call the terminal by using another terminal, and determine the position of the lost terminal by searching for a nearby terminal that generates a called ringtone.
  • the terminal executes the specific instruction when detecting that the terminal is not in the lock screen state.
  • the received specific instruction may be a normal operation instruction by the user, and the terminal may execute the received specific instruction.
  • the terminal when the terminal receives the specific instruction, the terminal first detects whether the terminal is currently in the lock screen state.
  • the specific instruction represents the instruction of controlling the terminal to decrease volume and/or the instruction of preventing the terminal from receiving a carrier signal.
  • the terminal skips executing the specific instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. If a user discovers in a timely manner that the terminal is lost, and the alarm tone is ringing nearby, the user may determine a position of the lost terminal according to a position of the ringing alarm tone, so as to find the lost terminal.
  • the terminal in the lock screen state skips executing the instruction of controlling the terminal to decrease volume and/or preventing the terminal from receiving a carrier signal
  • the user may determine a position of the lost terminal by calling the terminal and searching for a nearby terminal that generates a called ringtone, so as to find the lost terminal. Therefore, a probability of finding a lost terminal by a user is increased when the user discovers in a timely manner that the terminal is lost.
  • the alarm tone may be played by using the loudspeaker.
  • the thief may insert a headset to deactivate the loudspeaker in the terminal.
  • the terminal may perform special processing when headset insertion is detected in a lock screen state. Further, when it is determined that the terminal is currently in the lock screen state, the terminal may also first prompt a user to cancel the lock screen state, and then perform subsequent processing.
  • FIG. 2 another embodiment of the terminal anti-lost method in the embodiments of the present disclosure includes the following steps.
  • the terminal in a lock screen state detects headset insertion, the terminal deactivates the headset insertion and keeps the loudspeaker effective.
  • the loudspeaker when no headset is inserted, the loudspeaker is effective, and the loudspeaker is used as audio output.
  • the loudspeaker is deactivated, the loudspeaker is no longer used as audio output, and only the inserted headset is used as audio output.
  • the terminal when the terminal is in the lock screen state, if the terminal detects headset insertion, the terminal deactivates the headset insertion, that is, a headset insertion operation in this state does not deactivate the loudspeaker.
  • the loudspeaker remains effective, and the loudspeaker is still used as audio output of the terminal.
  • the terminal may first prompt a user to cancel the lock screen state of the terminal. If the lock screen state of the terminal is not canceled in a first predetermined time, the step of the deactivating the headset insertion and keeping the loudspeaker effective is triggered. It may be understood that, a real user can immediately cancel the lock screen state of the terminal after receiving the prompt, but a thief cannot immediately cancel the lock screen state of the terminal after receiving the prompt because the thief does not know how to unlock a screen, or does not know a password, or the like.
  • the terminal After the terminal prompts the user to cancel the lock screen state of the terminal, if the lock screen state of the terminal is not canceled in the first predetermined time, it indicates that a current user of the terminal may not be the real user, and the terminal deactivates the headset insertion and keeps the loudspeaker effective. If the lock screen state of the terminal is canceled in the first predetermined time, it indicates that the user may be the real user, and the terminal may execute the received headset insertion instruction. It should be noted that the foregoing optional step may not be performed with step 203 and step 204 at the same time.
  • the terminal when receiving the specific instruction, if the terminal detects that the terminal is currently in the lock screen state and detects the inserted headset, the terminal may perform only step 203 to prompt the user to cancel the lock screen state of the terminal. Two prompt operations are not performed at a same time.
  • a time for performing step 201 may be in a whole process when the terminal is in the lock screen state, and is not limited to before step 202 .
  • step 201 is not performed. This is not limited herein.
  • the terminal When the terminal receives a specific instruction, the terminal detects whether the terminal is currently in the lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal.
  • Step 202 is similar to step 101 , and details are not described herein again.
  • battery removal detection by the terminal may also be one specific instruction. If the terminal detects battery removal, the terminal does not power off immediately. The terminal may activate the built-in backup battery to supply power, detect whether the terminal is currently in a lock screen state, and perform a subsequent operation.
  • the terminal When detecting that the terminal is in the lock screen state, the terminal prompts a user to cancel the lock screen state of the terminal.
  • the terminal When detecting that the terminal is in the lock screen state, the terminal first prompts the user to cancel the lock screen state of the terminal.
  • the terminal may prompt the user to cancel the lock screen state in multiple manners, for example, directly popping up a dialog box to prompt the user to cancel the lock screen state, or vibrating the terminal and prompting in voice to the user to cancel the lock screen state.
  • manners for example, directly popping up a dialog box to prompt the user to cancel the lock screen state, or vibrating the terminal and prompting in voice to the user to cancel the lock screen state.
  • the terminal may display a countdown timer on the terminal at the same time, to prompt the user to cancel the lock screen state before the countdown timer expires.
  • the terminal skips executing the specific instruction if the lock screen state of the terminal is not canceled in a second predetermined time, and controls the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
  • the terminal After the terminal prompts the user to cancel the lock screen state, the terminal skips executing the received specific instruction if the lock screen state of the terminal is not canceled in the second predetermined time, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
  • first predetermined time and the second predetermined time may be set at delivery, or may be defined by the user, and the first predetermined time and the second predetermined time may be the same, or may be different. This is not limited herein.
  • the terminal executes the received instruction of controlling the terminal to decrease the volume or make no response.
  • the terminal volume may be controlled to increase to a maximum.
  • the volume may be increased to another value, such as 98% or 90% of total volume. This is not limited herein.
  • a user misoperation may occur.
  • the specific instruction is given to the terminal when the lock screen state is not canceled, and the lock screen state of the terminal is not canceled in the second predetermined time because the user is nervous or time is limited, thereby causing the terminal to play the alarm tone.
  • the following step may exist: when the lock screen state of the terminal is canceled, stopping, by the terminal, playing the alarm tone.
  • the terminal executes the specific instruction when detecting that the terminal is not in the lock screen state.
  • Step 205 is similar to step 103 , and details are not described herein again.
  • the terminal in the lock screen state receives the headset insertion instruction, the terminal deactivates the headset insertion and keeps the loudspeaker effective, so as to avoid a case in which an alarm tone or a called ringtone cannot be played by using the loudspeaker because a thief that steals the terminal inserts a headset to deactivate the loudspeaker of the terminal.
  • the terminal first prompts the user to cancel the lock screen state of the terminal, instead of directly controlling the terminal to increase volume and/or play the alarm tone.
  • the terminal can control, only when the lock screen state is not canceled in the second predetermined time, the terminal to increase the volume and/or play the alarm tone. This avoids frequently increasing the volume or playing the alarm tone that is caused because the user performs a misoperation or forgets to cancel the lock screen state, and greatly improves human-machine interaction performance of the terminal.
  • the terminal plays the alarm tone.
  • the terminal may further collect related information of a current user and upload the related information of the current user to a server.
  • FIG. 3 another embodiment of the terminal anti-lost method in the embodiments of the present disclosure includes the following steps.
  • the terminal in a lock screen state detects headset insertion, the terminal deactivates the headset insertion and keeps the loudspeaker effective.
  • the terminal When the terminal receives a specific instruction, the terminal detects whether the terminal is currently in the lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal.
  • the terminal When detecting that the terminal is in the lock screen state, the terminal prompts a user to cancel the lock screen state of the terminal.
  • the terminal skips executing the specific instruction if the lock screen state of the terminal is not canceled in a second predetermined time, and controls the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
  • Step 301 to step 304 are similar to step 201 to step 204 , and details are not described herein again.
  • the terminal obtains a biometric feature of a current user.
  • the terminal may obtain the biometric feature of the current user when skipping executing the received specific instruction.
  • the biometric feature may include a fingerprint, an iris, a picture, or the like.
  • the terminal may detect a fingerprint of the current user by using a touchscreen, and/or the terminal may photograph a picture of the current user by using a camera, and/or the terminal may identify iris information of the current user by using the camera, or the like.
  • the terminal may obtain information about another aspect of the current user in another manner that is not limited herein.
  • the obtained information of the current user may be one or more of the foregoing information. This is not limited herein.
  • the terminal After obtaining the biometric feature of the current user, the terminal uploads the obtained biometric feature to the preconfigured server, and/or sends the obtained biometric feature to the another terminal.
  • the preconfigured server may be provided by an equipment vendor to which the terminal belongs, or may be defined by the user. This is not limited herein.
  • the another terminal may also be preset by the user.
  • the terminal obtains an environmental parameter of an environment in which the current user is located.
  • the terminal may further obtain the environmental parameter of the environment in which the current user is located.
  • the environmental parameter may include a geographical position, environment information, or the like.
  • the terminal may lock a current position of the terminal (that is, the current user) by using a built-in global positioning satellite (GPS) capability, and/or the terminal may obtain the environmental parameter around the terminal by using a built-in sensor (such as a temperature sensor, a humidity sensor, an infrared sensor, or the like).
  • GPS global positioning satellite
  • the terminal After obtaining the environmental parameter of the environment in which the current user is located, the terminal uploads the obtained environmental parameter to the preconfigured server, and/or sends the obtained environmental parameter to the another terminal.
  • the preconfigured server may be provided by an equipment vendor to which the terminal belongs, or may be defined by the user. This is not limited herein.
  • the another terminal may also be preset by the user.
  • step 307 and step 308 may be executed, and a time sequence between step 307 and step 308 , and step 305 and step 306 is not limited.
  • the biometric feature and the environmental parameter may be obtained and then sent at the same time, or the first obtained one may be first sent. This is not limited herein.
  • the terminal executes the specific instruction when detecting that the terminal is not in the lock screen state.
  • Step 309 is similar to step 205 , and is not limited herein.
  • the terminal may further obtain the biometric feature or the environmental parameter of the current user, and upload the obtained biometric feature or the obtained environmental parameter to the preconfigured server or send the obtained biometric feature or the obtained environmental parameter to the another terminal.
  • the user may obtain the biometric feature or the environmental parameter of the current user that is received by the preconfigured server or the another terminal, and turn to a police station for help, so as to find the lost terminal.
  • an anti-lost option may exist in the settings option of the terminal. If the anti-lost option is enabled, the steps of the terminal anti-lost method in the foregoing embodiments may be performed. If the anti-lost option is disabled, the foregoing steps may not be performed, and an instruction received by the terminal is immediately executed in a current manner.
  • a terminal of a user A is stolen by a thief B.
  • the thief B gives a switch-off instruction to the terminal.
  • the terminal After receiving the switch-off instruction, the terminal detects that the terminal is currently in a lock screen state, and prompts the user to cancel the lock screen state of the terminal.
  • the thief B does not know an unlocking password, and cannot cancel the lock screen state of the terminal after two attempts. At this time, a 5-second preset unlocking time expires.
  • the terminal determines that the lock screen state is not canceled in 5 seconds, skips executing the switch-off instruction, adjusts volume to a maximum, and plays an alarm tone by using a loudspeaker.
  • the thief B takes out a headset, and inserts the headset into a headset jack of the terminal to prevent the terminal from generating a sound.
  • the terminal After receiving a headset insertion instruction, the terminal prompts the user to cancel the lock screen state of the terminal.
  • the thief cannot cancel the lock screen state of the terminal in the preset 5 seconds, and the terminal deactivates the headset insertion and keeps the loudspeaker effective to continuously play the alarm tone.
  • the terminal detects a fingerprint of the thief B by using a touchscreen, photographs a picture of the thief B by using a camera, locks a current position of the thief B by using a built-in GPS, and sends all the obtained information to a preconfigured server.
  • the user A discovers in a timely manner that the terminal is lost after the terminal is stolen, and hears the alarm tone ringing nearby.
  • the user A immediately finds the thief B according to the position of the ringing alarm tone, and finds the lost terminal.
  • a user A Because of a misoperation, a user A gives a volume decreasing instruction to a terminal when the terminal is in a lock screen state.
  • the terminal prompts the user A to cancel the lock screen state of the terminal.
  • the lock screen state of the terminal is canceled in the preset 5 seconds, and the terminal performs a volume decreasing operation.
  • the user A does not cancel the lock screen state of the terminal in the preset 5 seconds because of nervousness.
  • the terminal skips executing the volume decreasing instruction, and plays an alarm tone by using a loudspeaker.
  • the terminal plays the alarm tone
  • the user A actively cancels the lock screen state of the terminal. After detecting that the lock screen state is canceled, the terminal stops playing the alarm tone.
  • an embodiment of the terminal in the embodiments of the present disclosure includes: a detection module 401 configured to detect, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and an alarm module 402 configured to skip executing the specific instruction when the detection module 401 detects that the terminal is in the lock screen state, and control the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
  • the instruction of controlling the terminal to decrease volume may be a mute instruction or a volume decreasing instruction
  • the instruction of preventing the terminal from receiving a carrier signal may be a switch-off instruction or a SIM-card removing instruction. It may be understood that there may be another instruction of controlling the terminal to decrease volume or preventing the terminal from receiving a carrier signal. This is not limited herein.
  • the detection module 401 when the terminal receives the specific instruction, the detection module 401 first detects whether the terminal is currently in the lock screen state.
  • the specific instruction represents the instruction of controlling the terminal to decrease volume and/or the instruction of preventing the terminal from receiving a carrier signal.
  • the alarm module 402 skips executing the specific instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. If the user discovers in a timely manner that the terminal is lost, and the alarm tone is ringing nearby, the user may determine a position of the lost terminal according to a position of the ringing alarm tone, so as to find the lost terminal.
  • the terminal in the lock screen state skips executing the instruction of controlling the terminal to decrease volume and/or preventing the terminal from receiving a carrier signal
  • the user may determine a position of the lost terminal by calling the terminal and searching for a nearby terminal that generates a called ringtone, so as to find the lost terminal. Therefore, a probability of finding a lost terminal by a user is increased when the user discovers in a timely manner that the terminal is lost.
  • the alarm module 402 may play the alarm tone by using the loudspeaker.
  • the thief may insert a headset to deactivate a loudspeaker in the terminal.
  • the terminal may perform special processing when headset insertion is detected in a lock screen state.
  • the foregoing terminal further includes: a deactivation module 501 configured to: when headset insertion is detected in a lock screen state, deactivate the headset insertion and keep a loudspeaker effective.
  • the deactivation module 501 deactivates the headset insertion and keeps the loudspeaker effective, so as to avoid a case in which a loudspeaker of a terminal is deactivated and a called ringtone or an alarm tone cannot be played by using the loudspeaker because a thief that steals the terminal inserts a headset.
  • the deactivation module 501 deactivates the headset insertion and keeps the loudspeaker effective.
  • a user may be first prompted to unlock a screen. Referring to FIG.
  • the deactivation module 501 may include: a prompt unit 602 configured to prompt, when headset insertion is detected in a lock screen state, a user to cancel the lock screen state of the terminal; and a deactivation unit 601 configured to: when the lock screen state is not canceled in a first predetermined time after the prompt unit 602 prompts to cancel the lock screen state, deactivate the headset insertion and keep a loudspeaker effective.
  • the prompt unit 602 before the deactivation unit 601 deactivates the headset insertion and keeps the loudspeaker effective, the prompt unit 602 first prompts the user to unlock the screen, so as to improve human-machine interaction performance of the terminal.
  • the alarm module 402 controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
  • the terminal may first prompt to unlock a screen before skipping executing the received specific instruction. Referring to FIG. 7 , in another embodiment of the terminal in the embodiments of the present disclosure, the terminal shown in the foregoing FIG. 4 or FIG.
  • a prompt module 701 configured to prompt, before the alarm module 402 skips executing the instruction, a user to cancel a lock screen state of the terminal; and a trigger module 702 configured to trigger the alarm module 402 when the lock screen state is not canceled in a second predetermined time after the prompt module 701 prompts to cancel the lock screen state.
  • the alarm module 402 when the specific instruction is received and it is detected that the terminal is in the lock screen state, the alarm module 402 does not directly control the terminal to increase the volume and/or play the alarm tone.
  • the prompt module 701 first prompts the user to cancel the lock screen state of the terminal.
  • the trigger module 702 can trigger, only when the lock screen state is not canceled in the second predetermined time, the alarm module 402 to control the terminal to increase the volume and/or play the alarm tone. This avoids frequently increasing the volume or playing the alarm tone that is caused because the user performs a misoperation or forgets to cancel the lock screen state, and greatly improves human-machine interaction performance of the terminal.
  • the alarm module 402 controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
  • this is effective only in a scenario in which a user discovers in a timely manner that a terminal is lost and a thief is nearby.
  • related information of a current user may further be obtained and uploaded. Referring to FIG.
  • the foregoing terminal further includes: a first obtaining module 801 configured to obtain a biometric feature of a current user when the alarm module 402 skips executing the specific instruction; and a first sending module 802 configured to upload the biometric feature obtained by the first obtaining module 801 to a preconfigured server, and/or send the obtained biometric feature to another terminal.
  • a first obtaining module 801 configured to obtain a biometric feature of a current user when the alarm module 402 skips executing the specific instruction
  • a first sending module 802 configured to upload the biometric feature obtained by the first obtaining module 801 to a preconfigured server, and/or send the obtained biometric feature to another terminal.
  • the terminal may further include: a second obtaining module 803 configured to obtain, when the alarm module 402 skips executing the specific instruction, an environmental parameter of an environment in which a current user is located; and a second sending module 804 configured to upload the environmental parameter obtained by the first obtaining module 801 to a preconfigured server, and/or send the obtained environmental parameter to another terminal.
  • a second obtaining module 803 configured to obtain, when the alarm module 402 skips executing the specific instruction, an environmental parameter of an environment in which a current user is located
  • a second sending module 804 configured to upload the environmental parameter obtained by the first obtaining module 801 to a preconfigured server, and/or send the obtained environmental parameter to another terminal.
  • the first obtaining module 801 may obtain the biometric feature of the current user
  • the second obtaining module 803 may obtain the environmental parameter of the environment in which the current user is located.
  • the first sending module 802 uploads the obtained biometric feature to the preconfigured server, and/or sends the obtained biometric feature to the another terminal
  • the second sending module 804 uploads the obtained environmental parameter to the preconfigured server, and/or sends the obtained environmental parameter to the another terminal.
  • the user may obtain information about the current user that is received by the preconfigured server or the another terminal, and turn to a police station for help, so as to find the lost terminal.
  • the alarm module 402 may play the alarm tone. In an application, if it is a user misoperation, continuously playing an alarm tone may affect user experience.
  • the foregoing terminal further includes: a stop module 901 configured to: when the alarm module 402 plays an alarm tone by using a loudspeaker, stop playing the alarm tone when a lock screen state is canceled.
  • the stop module 901 may stop playing the alarm tone. In this way, if the terminal plays the alarm tone because the user misoperation, the user may confidently cancel the lock screen state, and the alarm tone is stopped playing, so as to improve human-machine interaction performance of the terminal.
  • the terminal of a user A is stolen by a thief B.
  • the thief B gives a switch-off instruction to the terminal.
  • the detection module 401 detects that the terminal is currently in a lock screen state, and the prompt module 701 prompts the user to cancel the lock screen state of the terminal.
  • the thief B does not know an unlocking password, and cannot cancel the lock screen state of the terminal after two attempts. At this time, a 5-second preset unlocking time expires.
  • the terminal determines that the lock screen state is not canceled in 5 seconds, and the trigger module 702 triggers the alarm module 402 to skip executing the switch-off instruction, adjust volume to a maximum, and play an alarm tone by using a loudspeaker.
  • the thief B takes out a headset, and inserts the headset into a headset jack of the terminal to prevent the terminal from generating a sound.
  • the prompt unit 602 prompts the user to cancel the lock screen state of the terminal. If the thief cannot cancel the lock screen state of the terminal in the preset 5 seconds, the deactivation unit 601 deactivates the headset insertion and keeps the loudspeaker effective to continuously play the alarm tone.
  • the first obtaining module 801 detects a fingerprint of the thief B by using a touchscreen, and photographs a picture of the thief B by using a camera, and the second obtaining module 803 locks a current position of the thief B by using a built-in GPS.
  • the first sending module 802 sends the obtained fingerprint and picture of the thief B to a preconfigured server, and the second sending module 804 sends the obtained current position of the thief B to another preset terminal.
  • the user A discovers in a timely manner that the terminal is lost after the terminal is stolen, and hears the alarm tone ringing nearby.
  • the user A immediately finds the thief B according to the position of the ringing alarm tone, and finds the lost terminal.
  • another embodiment of the terminal in the embodiments of the present disclosure includes: an input apparatus 1001 , an output apparatus 1002 , a processor 1003 , and a memory 1004 (a terminal 1000 may have one or more processors 1003 , and one processor 1003 is used as an example in FIG. 10 ).
  • the input apparatus 1001 , the output apparatus 1002 , the processor 1003 , and the memory 1004 may be connected by using a bus or in another manner. In FIG. 10 , a bus connection is used as an example.
  • the output apparatus 1002 includes a loudspeaker.
  • the processor 1003 is configured to perform the following steps: detecting, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and skipping executing the specific instruction when detecting that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
  • the specific instruction includes a switch-off instruction, a mute instruction, a volume decreasing instruction, or a SIM-card removing instruction.
  • the processor 1003 is further configured to perform the following step: when headset insertion is detected in the lock screen state, deactivating the headset insertion and keeping the loudspeaker effective.
  • the processor 1003 is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before deactivating the headset insertion; and if the lock screen state is not canceled in a first predetermined time, triggering the step of the deactivating the headset insertion.
  • the processor 1003 is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before skipping executing the specific instruction; and if the lock screen state is not canceled in a second predetermined time, triggering the step of the skipping executing the specific instruction.
  • the foregoing terminal further includes a transmitter 1101 .
  • the transmitter 1101 is connected to a processor 1003 , and the processor 1003 is further configured to perform the following steps: obtaining a biometric feature of a current user; and instructing the transmitter 1101 to upload the obtained biometric feature to a preconfigured server, and/or instructing the transmitter 1101 to send the obtained biometric feature to another terminal.
  • the processor 1003 is further configured to perform the following steps: obtaining an environmental parameter of an environment in which a current user is located; and instructing the transmitter 1101 to upload the obtained environmental parameter to a preconfigured server, and/or instructing the transmitter 1101 to send the obtained environmental parameter to another terminal.
  • the processor 1003 is further configured to perform the following step: when an alarm tone is played by using a loudspeaker, stopping playing the alarm tone if a lock screen state is canceled.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the described apparatus embodiment is merely an example.
  • the unit division is merely logical function division and may be other division in some embodiments.
  • a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed.
  • the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented by using some interfaces.
  • the indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
  • the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units may be selected according to needs to achieve the objectives of the solutions of the embodiments.
  • functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
  • the integrated unit may be implemented in a form of hardware, or may be implemented in a form of a software functional unit.
  • the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, the integrated unit may be stored in a computer-readable storage medium.
  • the software product is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, or a network device) to perform all or some of the steps of the methods described in the embodiments of the present disclosure.
  • the foregoing storage medium includes: any medium that can store program code, such as a universal serial bus (USB) flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
  • USB universal serial bus
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or an optical disc.

Abstract

Embodiments of the present disclosure disclose a terminal anti-lost method and a terminal, to resolve a problem that a lost terminal is difficult to find when a user discovers in a timely manner that the terminal is lost. The method in the embodiments of the present disclosure includes: first detecting, by the terminal when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction represents an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and skipping executing, by the terminal, the instruction when it is determined that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a national stage of International Application No. PCT/CN2014/095605, filed on Dec. 30, 2014, which is hereby incorporated by reference in its entirety.
TECHNICAL FIELD
The present disclosure relates to the communications field, and in particular, to a terminal anti-lost method and a terminal.
BACKGROUND
A terminal device such as a mobile phone or a tablet computer is often lost or stolen, for example, stolen in a subway, on a bus, or at a densely populated place.
To prevent the terminal device from being lost, currently, an anti-lost device may be connected to the terminal by using Bluetooth. When the terminal departs from the anti-lost device carried by a user for a specific distance, the anti-lost device may ring, and the user can discover in a timely manner that the terminal is lost.
Although it is discovered in a timely manner that the terminal is lost, laws and human rights restrict checks such as searching nearby people on the spot. Therefore, a position of the lost terminal cannot be found accurately, and a fact of being robbed has to be accepted.
SUMMARY
Embodiments of the present disclosure provide a terminal anti-lost method and a terminal, to resolve a problem that a lost terminal is difficult to find when a user discovers in a timely manner that the terminal is lost, rapidly lock a position of the terminal, and increase a probability of finding the lost terminal by the user.
A first aspect of the embodiments of the present disclosure provides a terminal anti-lost method, including: detecting, by a terminal when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a downlink carrier signal; and skipping executing, by the terminal, the specific instruction when detecting that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
With reference to the first aspect of the embodiments of the present disclosure, in a first implementation manner of the first aspect of the embodiments of the present disclosure, the specific instruction includes: a switch-off instruction, a mute instruction, a volume decreasing instruction, or a subscriber identity module (SIM) card removing instruction.
With reference to the first aspect or the first implementation manner of the first aspect of the embodiments of the present disclosure, in a second implementation manner of the first aspect of the embodiments of the present disclosure, the method further includes: when the terminal in the lock screen state detects headset insertion, deactivating, by the terminal, the headset insertion and keeping the loudspeaker effective.
With reference to the second implementation manner of the first aspect of the embodiments of the present disclosure, in a third implementation manner of the first aspect of the embodiments of the present disclosure, after the step of the detecting, by the terminal in the lock screen state, headset insertion, and before the step of the deactivating, by the terminal, the headset insertion and keeping the loudspeaker effective, the method further includes: prompting, by the terminal, a user to cancel the lock screen state of the terminal; and if the lock screen state of the terminal is not canceled in a first predetermined time, triggering the step of the deactivating, by the terminal, the headset insertion and keeping the loudspeaker effective.
With reference to any one of the first aspect to the second implementation manner of the first aspect of the embodiments of the present disclosure, in a fourth implementation manner of the first aspect of the embodiments of the present disclosure, after the step of the detecting that the terminal is in the lock screen state, and before the step of the skipping executing, by the terminal, the specific instruction, the method further includes: prompting, by the terminal, a user to cancel the lock screen state of the terminal; and if the lock screen state of the terminal is not canceled in a second predetermined time, triggering the step of the skipping executing, by the terminal, the specific instruction.
With reference to any one of the first aspect to the fourth implementation manner of the first aspect of the embodiments of the present disclosure, in a fifth implementation manner of the first aspect of the embodiments of the present disclosure, after the step of the skipping executing, by the terminal, the specific instruction, the method further includes: obtaining, by the terminal, a biometric feature of a current user; and uploading the obtained biometric feature to a preconfigured server, and/or sending the obtained biometric feature to another terminal.
With reference to any one of the first aspect to the fourth implementation manner of the first aspect of the embodiments of the present disclosure, in a sixth implementation manner of the first aspect of the embodiments of the present disclosure, after the step of the skipping executing, by the terminal, the specific instruction, the method further includes: obtaining, by the terminal, an environmental parameter of an environment in which a current user is located; and uploading the obtained environmental parameter to a preconfigured server, and/or sending the obtained environmental parameter to another terminal.
With reference to any one of the first aspect to the sixth implementation manner of the first aspect of the embodiments of the present disclosure, in a seventh implementation manner of the first aspect of the embodiments of the present disclosure, after the terminal plays the alarm tone by using the loudspeaker, the method further includes: when the lock screen state of the terminal is canceled, stopping playing, by the terminal, the alarm tone.
A second aspect of the embodiments of the present disclosure provides a terminal, including: a detection module configured to detect, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and an alarm module configured to skip executing the specific instruction when the detection module detects that the terminal is in the lock screen state, and control the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
With reference to the second aspect of the embodiments of the present disclosure, in a first implementation manner of the second aspect of the embodiments of the present disclosure, the specific instruction includes: a switch-off instruction, a mute instruction, a volume decreasing instruction, or a SIM-card removing instruction.
With reference to the second aspect or the first implementation manner of the second aspect of the embodiments of the present disclosure, in a second implementation manner of the second aspect of the embodiments of the present disclosure, the terminal further includes: a deactivation module configured to: when headset insertion is detected in the lock screen state, deactivate the headset insertion and keep the loudspeaker effective.
With reference to the second implementation manner of the second aspect of the embodiments of the present disclosure, in a third implementation manner of the second aspect of the embodiments of the present disclosure, the deactivation module includes: a prompt unit configured to prompt, when the inserted headset is detected in the lock screen state, a user to cancel the lock screen state of the terminal; and a deactivation unit configured to: when the lock screen state is not canceled in a first predetermined time after the prompt unit prompts to cancel the lock screen state, deactivate the headset insertion and keep the loudspeaker effective.
With reference to any one of the second aspect to the second implementation manner of the second aspect of the embodiments of the present disclosure, in a fourth implementation manner of the second aspect of the embodiments of the present disclosure, the terminal further includes: a prompt module configured to prompt, before the alarm module skips executing the instruction, a user to cancel the lock screen state of the terminal; and a trigger module configured to trigger the alarm module when the lock screen state is not canceled in a second predetermined time after the prompt module prompts to cancel the lock screen state.
With reference to any one of the second aspect to the fourth implementation manner of the second aspect in the embodiments of the present disclosure, in a fifth implementation manner of the second aspect of the embodiments of the present disclosure, the terminal further includes: a first obtaining module configured to obtain a biometric feature of a current user when the alarm module skips executing the specific instruction; and a first sending module configured to upload the biometric feature obtained by the first module to a preconfigured server, and/or send the obtained biometric feature to another terminal.
With reference to any one of the second aspect to the fourth implementation manner of the second aspect in the embodiments of the present disclosure, in a sixth implementation manner of the second aspect of the embodiments of the present disclosure, the terminal further includes: a second obtaining module configured to obtain, when the alarm module skips executing the specific instruction, an environmental parameter of an environment in which a current user is located; and a second sending module configured to upload the environmental parameter obtained by the first module to a preconfigured server, and/or send the obtained environmental parameter to another terminal.
With reference to any one of the second aspect to the sixth implementation manner of the second aspect in the embodiments of the present disclosure, in a seventh implementation manner of the second aspect of the embodiments of the present disclosure, the terminal further includes: a stop module configured to stop playing the alarm tone when the alarm module plays the alarm tone by using the loudspeaker and when the lock screen state is canceled.
A third aspect of the embodiments of the present disclosure provides a terminal, including: an input apparatus, an output apparatus, a processor, and a memory; where the input apparatus, the output apparatus, and the memory are connected to the processor; the output apparatus includes a loudspeaker; and by invoking an operation instruction stored in the memory, the processor is configured to perform the following steps: detecting, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and skipping executing the specific instruction when detecting that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
With reference to the third aspect of the embodiments of the present disclosure, in a first implementation manner of the third aspect of the embodiments of the present disclosure, the specific instruction includes a switch-off instruction, a mute instruction, a volume decreasing instruction, or a SIM-card removing instruction.
With reference to any one of the third aspect to the first implementation manner of the third aspect in the embodiments of the present disclosure, in a second implementation manner of the third aspect of the embodiments of the present disclosure, the processor is further configured to perform the following step: when headset insertion is detected in the lock screen state, deactivating the headset insertion and keeping the loudspeaker effective.
With reference to the second implementation manner of the third aspect in the embodiments of the present disclosure, in a third implementation manner of the third aspect of the embodiments of the present disclosure, the processor is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before deactivating the headset insertion; and if the lock screen state is not canceled in a first predetermined time, triggering the step of the deactivating the headset insertion.
With reference to any one of the third aspect to the second implementation manner of the third aspect in the embodiments of the present disclosure, in a fourth implementation manner of the third aspect of the embodiments of the present disclosure, the processor is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before skipping executing the specific instruction; and if the lock screen state is not canceled in a second predetermined time, triggering the step of the skipping executing the specific instruction.
With reference to any one of the third aspect to the fourth implementation manner of the third aspect in the embodiments of the present disclosure, in a fifth implementation manner of the third aspect of the embodiments of the present disclosure, the terminal further includes a transmitter; and the processor is further configured to perform the following steps: obtaining a biometric feature of a current user; and instructing the transmitter to upload the obtained biometric feature to a preconfigured server, and/or instructing the transmitter to send the obtained biometric feature to another terminal.
With reference to any one of the third aspect to the fourth implementation manner of the third aspect in the embodiments of the present disclosure, in a sixth implementation manner of the third aspect of the embodiments of the present disclosure, the terminal further includes a transmitter; and the processor is further configured to perform the following steps: obtaining an environmental parameter of an environment in which a current user is located; and instructing the transmitter to upload the obtained environmental parameter to a preconfigured server, and/or instructing the transmitter to send the obtained environmental parameter to another terminal.
With reference to any one of the third aspect to the sixth implementation manner of the third aspect in the embodiments of the present disclosure, in a seventh implementation manner of the third aspect of the embodiments of the present disclosure, the processor is further configured to perform the following step: when the alarm tone is played by using the loudspeaker, stopping playing the alarm tone if the lock screen state is canceled.
It may be learned from the foregoing technical solutions that the embodiments of the present disclosure have the following advantages: In the embodiments of the present disclosure, when the terminal receives the specific instruction, the terminal first detects whether the terminal is currently in the lock screen state. The specific instruction represents the instruction of controlling the terminal to decrease volume and/or the instruction of preventing the terminal from receiving a carrier signal. When it is determined that the terminal is in the lock screen state, the terminal skips executing the instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. If a user discovers in a timely manner that the terminal is lost, and the alarm tone is ringing nearby, the user may determine a position of the lost terminal according to a position of the ringing alarm tone, so as to find the lost terminal. If no alarm tone is ringing nearby, because the terminal in the lock screen state skips executing the instruction of controlling the terminal to decrease volume and/or preventing the terminal from receiving a carrier signal, the user may determine a position of the lost terminal by calling the terminal and searching for a nearby terminal that generates a called ringtone, so as to find the lost terminal. Therefore, a probability of finding a lost terminal by a user is increased when the user discovers in a timely manner that the terminal is lost.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a schematic flowchart of a terminal anti-lost method according to an embodiment of the present disclosure;
FIG. 2 is another schematic flowchart of a terminal anti-lost method according to an embodiment of the present disclosure;
FIG. 3 is another schematic flowchart of a terminal anti-lost method according to an embodiment of the present disclosure;
FIG. 4 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 5 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 6 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 7 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 8 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 9 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure;
FIG. 10 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure; and
FIG. 11 is another schematic structural diagram of a terminal according to an embodiment of the present disclosure.
DESCRIPTION OF EMBODIMENTS
The following clearly describes the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings of the present disclosure. The described embodiments are merely some but not all of the embodiments of the present disclosure. All other embodiments obtained by persons skilled in the art based on the embodiments of the present disclosure without creative efforts shall fall within the protection scope of the present disclosure.
The term “carrier signal” is used to represent a signal that is delivered by a base station to a terminal and that is used to call the terminal. If the terminal cannot receive the carrier signal, when another terminal calls the terminal, the terminal cannot receive the call, and does not play a called ringtone.
The term “loudspeaker” represents a speaker that is used to loudly play a sound.
Referring to FIG. 1, an embodiment of the terminal anti-lost method in the embodiments of the present disclosure includes the following steps.
101. When a terminal receives a specific instruction, the terminal detects whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal.
After stealing a terminal, to hide the terminal, a thief may send a type of specific instruction to the terminal after getting the terminal, and the type of specific instruction may be used to control the terminal to decrease volume or prevent the terminal from receiving a carrier signal. When receiving this type of specific instruction, the terminal may first detect whether the terminal is currently in a lock screen state, instead of immediately executing the received specific instruction.
There are many specific instructions. For example, the instruction of controlling the terminal to decrease volume may be a mute instruction or a volume decreasing instruction, and the instruction of preventing the terminal from receiving a carrier signal may be a switch-off instruction or a SIM-card removing instruction. It may be understood that there may be another instruction of controlling the terminal to decrease volume or preventing the terminal from receiving a carrier signal. This is not limited herein.
It should be noted that the lock screen state is different from a black screen state. The lock screen state may be a black screen state, or may not be a black screen state, and the black screen state may be a lock screen state, or may not be a lock screen state. The black screen state merely indicates that a screen is not lit up, and any operation may cancel the black screen state and light up the screen. The lock screen state cannot be canceled by any operation, and can be canceled only in a preset unlocking manner. There are many specific unlocking manners, such as entering an unlocking password by a user, or verifying a fingerprint or an iris of the user. There are many other unlocking manners that are not limited herein.
102. The terminal skips executing the specific instruction when detecting that the terminal is in the lock screen state, and controls the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
When detecting that the terminal is in the lock screen state, the terminal skips executing the received specific instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
There may be three feasible processing manners:
Manner 1: Control the terminal to increase the volume, but not play the alarm tone by using the loudspeaker.
Manner 2: Control the terminal not to increase the volume, but play the alarm tone by using the loudspeaker.
Manner 3: Control the terminal to increase the volume, and play the alarm tone by using the loudspeaker.
According to different application situations, any one may be selected. This is not limited herein.
It may be understood that the alarm tone may be a commonly-used alert sound, or may be a specific sound defined by the user, such as a specific song or an animal sound, so that the user identifies in a timely manner a position of the ringing alarm tone.
If the user discovers in a timely manner that the terminal is lost, and a nearby terminal generates the alarm tone, the user can determine in a timely manner a position of the lost terminal and find the lost terminal.
If the user discovers in a timely manner that the terminal is lost, but the alarm tone does not ring nearby, it indicates that the thief does not give the specific instruction to the terminal, or after the specific instruction is sent to the terminal, the terminal does not execute the received specific instruction and increases the terminal volume. In this case, the user may directly call the terminal by using another terminal, and determine the position of the lost terminal by searching for a nearby terminal that generates a called ringtone.
103. The terminal executes the specific instruction when detecting that the terminal is not in the lock screen state.
When detecting that the terminal is not in the lock screen state, the received specific instruction may be a normal operation instruction by the user, and the terminal may execute the received specific instruction.
In this embodiment of the present disclosure, when the terminal receives the specific instruction, the terminal first detects whether the terminal is currently in the lock screen state. The specific instruction represents the instruction of controlling the terminal to decrease volume and/or the instruction of preventing the terminal from receiving a carrier signal. When it is determined that the terminal is in the lock screen state, the terminal skips executing the specific instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. If a user discovers in a timely manner that the terminal is lost, and the alarm tone is ringing nearby, the user may determine a position of the lost terminal according to a position of the ringing alarm tone, so as to find the lost terminal. If no alarm tone is ringing nearby, because the terminal in the lock screen state skips executing the instruction of controlling the terminal to decrease volume and/or preventing the terminal from receiving a carrier signal, the user may determine a position of the lost terminal by calling the terminal and searching for a nearby terminal that generates a called ringtone, so as to find the lost terminal. Therefore, a probability of finding a lost terminal by a user is increased when the user discovers in a timely manner that the terminal is lost.
In the foregoing embodiment, the alarm tone may be played by using the loudspeaker. In an application, if a terminal is stolen by a thief, the thief may insert a headset to deactivate the loudspeaker in the terminal. To resolve this problem, the terminal may perform special processing when headset insertion is detected in a lock screen state. Further, when it is determined that the terminal is currently in the lock screen state, the terminal may also first prompt a user to cancel the lock screen state, and then perform subsequent processing. Referring to FIG. 2, another embodiment of the terminal anti-lost method in the embodiments of the present disclosure includes the following steps.
201. When the terminal in a lock screen state detects headset insertion, the terminal deactivates the headset insertion and keeps the loudspeaker effective.
It may be understood that currently, in a terminal that has both a headset jack and a loudspeaker, when no headset is inserted, the loudspeaker is effective, and the loudspeaker is used as audio output. When a headset is inserted, the loudspeaker is deactivated, the loudspeaker is no longer used as audio output, and only the inserted headset is used as audio output. To prevent the thief from inserting the headset and deactivating the loudspeaker of the terminal, when the terminal is in the lock screen state, if the terminal detects headset insertion, the terminal deactivates the headset insertion, that is, a headset insertion operation in this state does not deactivate the loudspeaker. The loudspeaker remains effective, and the loudspeaker is still used as audio output of the terminal.
Optionally, in an application, before deactivating the headset insertion, the terminal may first prompt a user to cancel the lock screen state of the terminal. If the lock screen state of the terminal is not canceled in a first predetermined time, the step of the deactivating the headset insertion and keeping the loudspeaker effective is triggered. It may be understood that, a real user can immediately cancel the lock screen state of the terminal after receiving the prompt, but a thief cannot immediately cancel the lock screen state of the terminal after receiving the prompt because the thief does not know how to unlock a screen, or does not know a password, or the like.
After the terminal prompts the user to cancel the lock screen state of the terminal, if the lock screen state of the terminal is not canceled in the first predetermined time, it indicates that a current user of the terminal may not be the real user, and the terminal deactivates the headset insertion and keeps the loudspeaker effective. If the lock screen state of the terminal is canceled in the first predetermined time, it indicates that the user may be the real user, and the terminal may execute the received headset insertion instruction. It should be noted that the foregoing optional step may not be performed with step 203 and step 204 at the same time. For example, when receiving the specific instruction, if the terminal detects that the terminal is currently in the lock screen state and detects the inserted headset, the terminal may perform only step 203 to prompt the user to cancel the lock screen state of the terminal. Two prompt operations are not performed at a same time.
It may be understood that a time for performing step 201 may be in a whole process when the terminal is in the lock screen state, and is not limited to before step 202. In addition, in some scenarios, such as in the lock screen state, if the terminal does not receive the headset insertion instruction, step 201 is not performed. This is not limited herein.
202. When the terminal receives a specific instruction, the terminal detects whether the terminal is currently in the lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal.
Step 202 is similar to step 101, and details are not described herein again.
In addition, optionally, in a terminal that has a built-in backup battery, battery removal detection by the terminal may also be one specific instruction. If the terminal detects battery removal, the terminal does not power off immediately. The terminal may activate the built-in backup battery to supply power, detect whether the terminal is currently in a lock screen state, and perform a subsequent operation.
203. When detecting that the terminal is in the lock screen state, the terminal prompts a user to cancel the lock screen state of the terminal.
When detecting that the terminal is in the lock screen state, the terminal first prompts the user to cancel the lock screen state of the terminal.
It may be understood that the terminal may prompt the user to cancel the lock screen state in multiple manners, for example, directly popping up a dialog box to prompt the user to cancel the lock screen state, or vibrating the terminal and prompting in voice to the user to cancel the lock screen state. There may be many other manners that are not limited herein.
It may be understood that when prompting the user to cancel the lock screen state of the terminal, the terminal may display a countdown timer on the terminal at the same time, to prompt the user to cancel the lock screen state before the countdown timer expires.
204. The terminal skips executing the specific instruction if the lock screen state of the terminal is not canceled in a second predetermined time, and controls the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
After the terminal prompts the user to cancel the lock screen state, the terminal skips executing the received specific instruction if the lock screen state of the terminal is not canceled in the second predetermined time, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker.
It may be understood that the first predetermined time and the second predetermined time may be set at delivery, or may be defined by the user, and the first predetermined time and the second predetermined time may be the same, or may be different. This is not limited herein.
If the lock screen state of the terminal is canceled in the second predetermined time, the terminal executes the received instruction of controlling the terminal to decrease the volume or make no response.
Optionally, in the solution of performing the step of controlling the terminal to increase the volume, to enable the user to easily hear a called ringtone of the terminal, or to improve an effect of playing the alarm tone by the loudspeaker, the terminal volume may be controlled to increase to a maximum. Certainly, in an application, the volume may be increased to another value, such as 98% or 90% of total volume. This is not limited herein.
Optionally, in application, a user misoperation may occur. The specific instruction is given to the terminal when the lock screen state is not canceled, and the lock screen state of the terminal is not canceled in the second predetermined time because the user is nervous or time is limited, thereby causing the terminal to play the alarm tone. In this scenario, the following step may exist: when the lock screen state of the terminal is canceled, stopping, by the terminal, playing the alarm tone.
205. The terminal executes the specific instruction when detecting that the terminal is not in the lock screen state.
Step 205 is similar to step 103, and details are not described herein again.
In this embodiment of the present disclosure, if the terminal in the lock screen state receives the headset insertion instruction, the terminal deactivates the headset insertion and keeps the loudspeaker effective, so as to avoid a case in which an alarm tone or a called ringtone cannot be played by using the loudspeaker because a thief that steals the terminal inserts a headset to deactivate the loudspeaker of the terminal. Further, when receiving the specific instruction and detecting that the terminal is in the lock screen state, the terminal first prompts the user to cancel the lock screen state of the terminal, instead of directly controlling the terminal to increase volume and/or play the alarm tone. The terminal can control, only when the lock screen state is not canceled in the second predetermined time, the terminal to increase the volume and/or play the alarm tone. This avoids frequently increasing the volume or playing the alarm tone that is caused because the user performs a misoperation or forgets to cancel the lock screen state, and greatly improves human-machine interaction performance of the terminal.
In the foregoing embodiment, the terminal plays the alarm tone. In an application, while playing the alarm tone, the terminal may further collect related information of a current user and upload the related information of the current user to a server. Referring to FIG. 3, another embodiment of the terminal anti-lost method in the embodiments of the present disclosure includes the following steps.
301. When the terminal in a lock screen state detects headset insertion, the terminal deactivates the headset insertion and keeps the loudspeaker effective.
302. When the terminal receives a specific instruction, the terminal detects whether the terminal is currently in the lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal.
303. When detecting that the terminal is in the lock screen state, the terminal prompts a user to cancel the lock screen state of the terminal.
304. The terminal skips executing the specific instruction if the lock screen state of the terminal is not canceled in a second predetermined time, and controls the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
Step 301 to step 304 are similar to step 201 to step 204, and details are not described herein again.
305. The terminal obtains a biometric feature of a current user.
The terminal may obtain the biometric feature of the current user when skipping executing the received specific instruction. The biometric feature may include a fingerprint, an iris, a picture, or the like.
The terminal may detect a fingerprint of the current user by using a touchscreen, and/or the terminal may photograph a picture of the current user by using a camera, and/or the terminal may identify iris information of the current user by using the camera, or the like.
Alternatively, the terminal may obtain information about another aspect of the current user in another manner that is not limited herein. The obtained information of the current user may be one or more of the foregoing information. This is not limited herein.
306. Upload the obtained biometric feature to a preconfigured server, and/or send the obtained biometric feature to another terminal.
After obtaining the biometric feature of the current user, the terminal uploads the obtained biometric feature to the preconfigured server, and/or sends the obtained biometric feature to the another terminal.
It may be understood that the preconfigured server may be provided by an equipment vendor to which the terminal belongs, or may be defined by the user. This is not limited herein. The another terminal may also be preset by the user.
307. The terminal obtains an environmental parameter of an environment in which the current user is located.
When skipping executing the received specific instruction, the terminal may further obtain the environmental parameter of the environment in which the current user is located. The environmental parameter may include a geographical position, environment information, or the like.
The terminal may lock a current position of the terminal (that is, the current user) by using a built-in global positioning satellite (GPS) capability, and/or the terminal may obtain the environmental parameter around the terminal by using a built-in sensor (such as a temperature sensor, a humidity sensor, an infrared sensor, or the like).
308. Upload the obtained environmental parameter to a preconfigured server, and/or send the obtained environmental parameter to another terminal.
After obtaining the environmental parameter of the environment in which the current user is located, the terminal uploads the obtained environmental parameter to the preconfigured server, and/or sends the obtained environmental parameter to the another terminal.
It may be understood that the preconfigured server may be provided by an equipment vendor to which the terminal belongs, or may be defined by the user. This is not limited herein. The another terminal may also be preset by the user.
It may be understood that step 307 and step 308, or step 305 and step 306 or both may be executed, and a time sequence between step 307 and step 308, and step 305 and step 306 is not limited. For example, the biometric feature and the environmental parameter may be obtained and then sent at the same time, or the first obtained one may be first sent. This is not limited herein.
309. The terminal executes the specific instruction when detecting that the terminal is not in the lock screen state.
Step 309 is similar to step 205, and is not limited herein.
In this embodiment of the present disclosure, while controlling the terminal to increase the volume or play the alarm tone, the terminal may further obtain the biometric feature or the environmental parameter of the current user, and upload the obtained biometric feature or the obtained environmental parameter to the preconfigured server or send the obtained biometric feature or the obtained environmental parameter to the another terminal. In this way, if a user does not discover in a timely manner that the terminal is lost, or the lost terminal is not near the user, the user may obtain the biometric feature or the environmental parameter of the current user that is received by the preconfigured server or the another terminal, and turn to a police station for help, so as to find the lost terminal.
It may be understood that in an application, it may be set that the execution steps of the terminal anti-lost method in the foregoing embodiments are performed after a specific function in the terminal is enabled. For example, an anti-lost option may exist in the settings option of the terminal. If the anti-lost option is enabled, the steps of the terminal anti-lost method in the foregoing embodiments may be performed. If the anti-lost option is disabled, the foregoing steps may not be performed, and an instruction received by the terminal is immediately executed in a current manner.
For ease of understanding, the following uses a specific application scenario to describe in detail the terminal anti-lost method in the embodiments of the present disclosure.
At a train station, a terminal of a user A is stolen by a thief B.
To prevent the user A from calling the terminal after the user A discovers that the terminal is lost, the thief B gives a switch-off instruction to the terminal.
After receiving the switch-off instruction, the terminal detects that the terminal is currently in a lock screen state, and prompts the user to cancel the lock screen state of the terminal.
The thief B does not know an unlocking password, and cannot cancel the lock screen state of the terminal after two attempts. At this time, a 5-second preset unlocking time expires. The terminal determines that the lock screen state is not canceled in 5 seconds, skips executing the switch-off instruction, adjusts volume to a maximum, and plays an alarm tone by using a loudspeaker.
At this time, the thief B takes out a headset, and inserts the headset into a headset jack of the terminal to prevent the terminal from generating a sound. After receiving a headset insertion instruction, the terminal prompts the user to cancel the lock screen state of the terminal. The thief cannot cancel the lock screen state of the terminal in the preset 5 seconds, and the terminal deactivates the headset insertion and keeps the loudspeaker effective to continuously play the alarm tone.
At the same time, the terminal detects a fingerprint of the thief B by using a touchscreen, photographs a picture of the thief B by using a camera, locks a current position of the thief B by using a built-in GPS, and sends all the obtained information to a preconfigured server.
The user A discovers in a timely manner that the terminal is lost after the terminal is stolen, and hears the alarm tone ringing nearby.
The user A immediately finds the thief B according to the position of the ringing alarm tone, and finds the lost terminal.
The foregoing gives a scenario in which a terminal is stolen and found, and the following gives a scenario of a user misoperation.
Because of a misoperation, a user A gives a volume decreasing instruction to a terminal when the terminal is in a lock screen state.
The terminal prompts the user A to cancel the lock screen state of the terminal.
In a first case, the lock screen state of the terminal is canceled in the preset 5 seconds, and the terminal performs a volume decreasing operation.
In a second case, the user A does not cancel the lock screen state of the terminal in the preset 5 seconds because of nervousness. The terminal skips executing the volume decreasing instruction, and plays an alarm tone by using a loudspeaker.
When the terminal plays the alarm tone, the user A actively cancels the lock screen state of the terminal. After detecting that the lock screen state is canceled, the terminal stops playing the alarm tone.
The following describes the terminal in the embodiments of the present disclosure. Referring to FIG. 4, an embodiment of the terminal in the embodiments of the present disclosure includes: a detection module 401 configured to detect, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and an alarm module 402 configured to skip executing the specific instruction when the detection module 401 detects that the terminal is in the lock screen state, and control the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.
There are many specific instructions. For example, the instruction of controlling the terminal to decrease volume may be a mute instruction or a volume decreasing instruction, and the instruction of preventing the terminal from receiving a carrier signal may be a switch-off instruction or a SIM-card removing instruction. It may be understood that there may be another instruction of controlling the terminal to decrease volume or preventing the terminal from receiving a carrier signal. This is not limited herein.
In this embodiment of the present disclosure, when the terminal receives the specific instruction, the detection module 401 first detects whether the terminal is currently in the lock screen state. The specific instruction represents the instruction of controlling the terminal to decrease volume and/or the instruction of preventing the terminal from receiving a carrier signal. When it is determined that the terminal is in the lock screen state, the alarm module 402 skips executing the specific instruction, and controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. If the user discovers in a timely manner that the terminal is lost, and the alarm tone is ringing nearby, the user may determine a position of the lost terminal according to a position of the ringing alarm tone, so as to find the lost terminal. If no alarm tone is ringing nearby, because the terminal in the lock screen state skips executing the instruction of controlling the terminal to decrease volume and/or preventing the terminal from receiving a carrier signal, the user may determine a position of the lost terminal by calling the terminal and searching for a nearby terminal that generates a called ringtone, so as to find the lost terminal. Therefore, a probability of finding a lost terminal by a user is increased when the user discovers in a timely manner that the terminal is lost.
In the foregoing embodiment, the alarm module 402 may play the alarm tone by using the loudspeaker. In an application, if a terminal is stolen by a thief, the thief may insert a headset to deactivate a loudspeaker in the terminal. To resolve this problem, the terminal may perform special processing when headset insertion is detected in a lock screen state. Referring to FIG. 5, in another embodiment of the terminal in the embodiments of the present disclosure, the foregoing terminal further includes: a deactivation module 501 configured to: when headset insertion is detected in a lock screen state, deactivate the headset insertion and keep a loudspeaker effective.
In this embodiment of the present disclosure, if the terminal in the lock screen state detects the inserted headset, the deactivation module 501 deactivates the headset insertion and keeps the loudspeaker effective, so as to avoid a case in which a loudspeaker of a terminal is deactivated and a called ringtone or an alarm tone cannot be played by using the loudspeaker because a thief that steals the terminal inserts a headset.
In the foregoing embodiment, the deactivation module 501 deactivates the headset insertion and keeps the loudspeaker effective. In an application, to provide better user experience, before the deactivation module 501 deactivates the headset insertion and keeps the loudspeaker effective, a user may be first prompted to unlock a screen. Referring to FIG. 6, in another embodiment of the terminal in the embodiments of the present disclosure, the deactivation module 501 may include: a prompt unit 602 configured to prompt, when headset insertion is detected in a lock screen state, a user to cancel the lock screen state of the terminal; and a deactivation unit 601 configured to: when the lock screen state is not canceled in a first predetermined time after the prompt unit 602 prompts to cancel the lock screen state, deactivate the headset insertion and keep a loudspeaker effective.
In this embodiment, before the deactivation unit 601 deactivates the headset insertion and keeps the loudspeaker effective, the prompt unit 602 first prompts the user to unlock the screen, so as to improve human-machine interaction performance of the terminal.
In the foregoing embodiment, if the specific instruction is received, and the detection module 401 detects that the terminal is in the lock screen state, the alarm module 402 controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. In an application, to avoid frequently increasing the volume or playing the alarm tone because of a user misoperation, the terminal may first prompt to unlock a screen before skipping executing the received specific instruction. Referring to FIG. 7, in another embodiment of the terminal in the embodiments of the present disclosure, the terminal shown in the foregoing FIG. 4 or FIG. 5 further includes: a prompt module 701 configured to prompt, before the alarm module 402 skips executing the instruction, a user to cancel a lock screen state of the terminal; and a trigger module 702 configured to trigger the alarm module 402 when the lock screen state is not canceled in a second predetermined time after the prompt module 701 prompts to cancel the lock screen state.
In this embodiment of the present disclosure, when the specific instruction is received and it is detected that the terminal is in the lock screen state, the alarm module 402 does not directly control the terminal to increase the volume and/or play the alarm tone. The prompt module 701 first prompts the user to cancel the lock screen state of the terminal. The trigger module 702 can trigger, only when the lock screen state is not canceled in the second predetermined time, the alarm module 402 to control the terminal to increase the volume and/or play the alarm tone. This avoids frequently increasing the volume or playing the alarm tone that is caused because the user performs a misoperation or forgets to cancel the lock screen state, and greatly improves human-machine interaction performance of the terminal.
In the foregoing embodiment, the alarm module 402 controls the terminal to increase the volume and/or play the alarm tone by using the loudspeaker. However, this is effective only in a scenario in which a user discovers in a timely manner that a terminal is lost and a thief is nearby. In an application, when a received specific instruction is not executed, related information of a current user may further be obtained and uploaded. Referring to FIG. 8, in another embodiment of the terminal in the embodiments of the present disclosure, the foregoing terminal further includes: a first obtaining module 801 configured to obtain a biometric feature of a current user when the alarm module 402 skips executing the specific instruction; and a first sending module 802 configured to upload the biometric feature obtained by the first obtaining module 801 to a preconfigured server, and/or send the obtained biometric feature to another terminal.
Optionally, the terminal may further include: a second obtaining module 803 configured to obtain, when the alarm module 402 skips executing the specific instruction, an environmental parameter of an environment in which a current user is located; and a second sending module 804 configured to upload the environmental parameter obtained by the first obtaining module 801 to a preconfigured server, and/or send the obtained environmental parameter to another terminal.
In this embodiment of the present disclosure, when the alarm module 402 skips executing the received specific instruction, the first obtaining module 801 may obtain the biometric feature of the current user, and the second obtaining module 803 may obtain the environmental parameter of the environment in which the current user is located. The first sending module 802 uploads the obtained biometric feature to the preconfigured server, and/or sends the obtained biometric feature to the another terminal, and the second sending module 804 uploads the obtained environmental parameter to the preconfigured server, and/or sends the obtained environmental parameter to the another terminal. In this way, if the user does not discover in a timely manner that the terminal is lost, or the lost terminal is not near the user, the user may obtain information about the current user that is received by the preconfigured server or the another terminal, and turn to a police station for help, so as to find the lost terminal.
In the foregoing embodiment, the alarm module 402 may play the alarm tone. In an application, if it is a user misoperation, continuously playing an alarm tone may affect user experience. Referring to FIG. 9, in another embodiment of the terminal in the embodiments of the present disclosure, the foregoing terminal further includes: a stop module 901 configured to: when the alarm module 402 plays an alarm tone by using a loudspeaker, stop playing the alarm tone when a lock screen state is canceled.
In this embodiment, when the alarm module 402 plays the alarm tone by using the loudspeaker, if the lock screen state is canceled, the stop module 901 may stop playing the alarm tone. In this way, if the terminal plays the alarm tone because the user misoperation, the user may confidently cancel the lock screen state, and the alarm tone is stopped playing, so as to improve human-machine interaction performance of the terminal.
For ease of understanding the foregoing embodiments, the following describes an interaction process of the modules of the foregoing terminal in a specific application scenario.
At a train station, the terminal of a user A is stolen by a thief B.
To prevent the user A from calling the terminal after the user A discovers that the terminal is lost, the thief B gives a switch-off instruction to the terminal.
After the terminal receives the switch-off instruction, the detection module 401 detects that the terminal is currently in a lock screen state, and the prompt module 701 prompts the user to cancel the lock screen state of the terminal.
The thief B does not know an unlocking password, and cannot cancel the lock screen state of the terminal after two attempts. At this time, a 5-second preset unlocking time expires. The terminal determines that the lock screen state is not canceled in 5 seconds, and the trigger module 702 triggers the alarm module 402 to skip executing the switch-off instruction, adjust volume to a maximum, and play an alarm tone by using a loudspeaker.
At this time, the thief B takes out a headset, and inserts the headset into a headset jack of the terminal to prevent the terminal from generating a sound. After the terminal receives a headset insertion instruction, the prompt unit 602 prompts the user to cancel the lock screen state of the terminal. If the thief cannot cancel the lock screen state of the terminal in the preset 5 seconds, the deactivation unit 601 deactivates the headset insertion and keeps the loudspeaker effective to continuously play the alarm tone.
At the same time, the first obtaining module 801 detects a fingerprint of the thief B by using a touchscreen, and photographs a picture of the thief B by using a camera, and the second obtaining module 803 locks a current position of the thief B by using a built-in GPS. The first sending module 802 sends the obtained fingerprint and picture of the thief B to a preconfigured server, and the second sending module 804 sends the obtained current position of the thief B to another preset terminal.
The user A discovers in a timely manner that the terminal is lost after the terminal is stolen, and hears the alarm tone ringing nearby.
The user A immediately finds the thief B according to the position of the ringing alarm tone, and finds the lost terminal.
Referring to FIG. 10, another embodiment of the terminal in the embodiments of the present disclosure includes: an input apparatus 1001, an output apparatus 1002, a processor 1003, and a memory 1004 (a terminal 1000 may have one or more processors 1003, and one processor 1003 is used as an example in FIG. 10). In some embodiments of the present disclosure, the input apparatus 1001, the output apparatus 1002, the processor 1003, and the memory 1004 may be connected by using a bus or in another manner. In FIG. 10, a bus connection is used as an example.
The output apparatus 1002 includes a loudspeaker.
By invoking an operation instruction stored in the memory 1004, the processor 1003 is configured to perform the following steps: detecting, when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction is used to represent an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and skipping executing the specific instruction when detecting that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using the loudspeaker.
In some embodiments of the present disclosure, the specific instruction includes a switch-off instruction, a mute instruction, a volume decreasing instruction, or a SIM-card removing instruction.
In some embodiments of the present disclosure, the processor 1003 is further configured to perform the following step: when headset insertion is detected in the lock screen state, deactivating the headset insertion and keeping the loudspeaker effective.
In some embodiments of the present disclosure, the processor 1003 is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before deactivating the headset insertion; and if the lock screen state is not canceled in a first predetermined time, triggering the step of the deactivating the headset insertion.
In some embodiments of the present disclosure, the processor 1003 is further configured to perform the following steps: prompting a user to cancel the lock screen state of the terminal before skipping executing the specific instruction; and if the lock screen state is not canceled in a second predetermined time, triggering the step of the skipping executing the specific instruction.
Referring to FIG. 11, in another embodiment of the terminal in the embodiments of the present disclosure, the foregoing terminal further includes a transmitter 1101. The transmitter 1101 is connected to a processor 1003, and the processor 1003 is further configured to perform the following steps: obtaining a biometric feature of a current user; and instructing the transmitter 1101 to upload the obtained biometric feature to a preconfigured server, and/or instructing the transmitter 1101 to send the obtained biometric feature to another terminal.
Optionally, in another embodiment of the terminal in the embodiments of the present disclosure, in a terminal 1100 shown in FIG. 11, the processor 1003 is further configured to perform the following steps: obtaining an environmental parameter of an environment in which a current user is located; and instructing the transmitter 1101 to upload the obtained environmental parameter to a preconfigured server, and/or instructing the transmitter 1101 to send the obtained environmental parameter to another terminal.
In some embodiments of the present disclosure, the processor 1003 is further configured to perform the following step: when an alarm tone is played by using a loudspeaker, stopping playing the alarm tone if a lock screen state is canceled.
It may be clearly understood by persons skilled in the art that, for the purpose of convenient and brief description, for a detailed working process of the foregoing system, apparatus, and unit, reference may be made to a corresponding process in the foregoing method embodiments, and details are not described herein again.
In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the described apparatus embodiment is merely an example. For example, the unit division is merely logical function division and may be other division in some embodiments. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented by using some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units may be selected according to needs to achieve the objectives of the solutions of the embodiments.
In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in a form of hardware, or may be implemented in a form of a software functional unit.
When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, the integrated unit may be stored in a computer-readable storage medium. Based on such an understanding, the technical solutions of the present disclosure essentially, or the part contributing to the prior art, or all or some of the technical solutions may be implemented in the form of a software product. The software product is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, or a network device) to perform all or some of the steps of the methods described in the embodiments of the present disclosure. The foregoing storage medium includes: any medium that can store program code, such as a universal serial bus (USB) flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
The foregoing embodiments are merely intended for describing the technical solutions of the present disclosure, but not for limiting the present disclosure. Although the present disclosure is described in detail with reference to the foregoing embodiments, persons of ordinary skill in the art should understand that they may still make modifications to the technical solutions described in the foregoing embodiments or make equivalent replacements to some technical features thereof, without departing from the spirit and scope of the technical solutions of the embodiments of the present disclosure.

Claims (20)

What is claimed is:
1. A terminal anti-lost method comprising:
receiving, by a terminal, a specific instruction, wherein the specific instruction comprises at least one of an instruction for controlling the terminal to decrease its volume or an instruction for preventing the terminal from receiving a carrier signal;
in response to receiving the specific instruction, detecting, by the terminal, whether the terminal is currently in a lock screen state;
skipping, by the terminal, execution of the specific instruction when the terminal is in the lock screen state and controlling the terminal to increase a volume and/or play an alarm tone from a loudspeaker; and
executing, by the terminal, the specific instruction when the terminal is not in the lock screen state.
2. The method of claim 1, wherein the instruction for controlling the terminal to decrease its volume comprises one or more of a switch-off instruction, a mute instruction, or a volume decreasing instruction, and wherein the instruction for preventing the terminal from receiving a carrier signal comprises one or more of the switch-off instruction or a subscriber identity module-card (SIM-card) removing instruction.
3. The method of claim 1, further comprising:
detecting, by the terminal, headset insertion when a headset is inserted into the terminal; and
deactivating, by the terminal, the headset insertion when the terminal is in the lock screen state.
4. The method of claim 3, further comprising:
prompting, by the terminal, a user to cancel the lock screen state of the terminal prior to deactivating the headset insertion; and
deactivating the headset insertion when the lock screen state of the terminal is not canceled in a predetermined time.
5. The method of claim 1, further comprising:
prompting, by the terminal, a user to cancel the lock screen state of the terminal prior to skipping executing the specific instruction; and
skipping, by the terminal, the execution of the specific instruction when the lock screen state of the terminal is not canceled in a predetermined time.
6. The method of claim 1, further comprising:
obtaining, by the terminal, a biometric feature; and
uploading the biometric feature to a server.
7. The method of claim 1, further comprising:
obtaining, by the terminal, an environmental parameter of an environment in which the terminal is located; and
uploading the environmental parameter to a server.
8. The method of claim 1, further comprising stop playing, by the terminal, the alarm tone when the lock screen state of the terminal is canceled.
9. The method of claim 1, further comprising:
obtaining, by the terminal, a biometric feature; and
sending the biometric feature to another terminal.
10. The method of claim 1, further comprising:
obtaining, by the terminal, a biometric feature;
uploading the biometric feature to a server; and
sending the biometric feature to the other terminal.
11. The method of claim 1, further comprising:
obtaining, by the terminal, an environmental parameter of an environment in which the terminal is located; and
sending the environmental parameter to another terminal.
12. The method of claim 1, further comprising:
obtaining, by the terminal, an environmental parameter of an environment in which the terminal is located;
uploading the environmental parameter to a server; and
sending the environmental parameter to the other terminal.
13. A terminal, comprising:
a loudspeaker;
an input device;
a memory comprising operating instructions; and
a processor coupled to the loudspeaker, the input device, and the memory, wherein the operating instructions cause the processor to be configured to:
receive a specific instruction, wherein the specific instruction comprises at least one of an instruction for controlling the terminal to decrease its volume or an instruction for preventing the terminal from receiving a carrier signal;
in response to receiving the specific instruction, detect whether the terminal is currently in a lock screen state;
skip execution of the specific instruction when the terminal is in the lock screen state control the terminal to increase a volume and/or play an alarm tone from the loudspeaker; and
execute the specific instruction when the terminal is not in the lock screen state.
14. The terminal of claim 13, wherein controlling the terminal to decrease its volume comprises one or more of a switch-off instruction, a mute instruction, or a volume decreasing instruction, and wherein the instruction for preventing the terminal from receiving a carrier signal comprises one or more of the switch-off instruction or a subscriber identity module-card (SIM-card) removing instruction.
15. The terminal of claim 13, wherein the operating instructions further cause the processor to be configured to:
detect a headset insertion when a headset is inserted into the terminal; and
deactivate the headset insertion when the terminal is in the lock screen state.
16. The terminal of claim 15, wherein the operating instructions further cause the processor to be configured to:
prompt a user to cancel the lock screen state of the terminal before deactivating the headset insertion; and
deactivate the headset insertion when the lock screen state is not canceled in a predetermined time.
17. The terminal of claim 13, wherein the operating instructions further cause the processor to be configured to:
prompt a user to cancel the lock screen state of the terminal before skipping the specific instruction; and
skip execution of the specific instruction when the lock screen state is not canceled in a predetermined time.
18. The terminal of claim 13, further comprising a transmitter, wherein the operating instructions further cause the processor to be configured to:
obtain a biometric feature; and
either transmit the biometric feature to a server, transmit the biometric feature to another terminal, or transmit the biometric feature to each of the server and the other terminal.
19. The terminal of claim 13, wherein the terminal further comprises a transmitter; and wherein the operating instructions further cause the processor to be configured to:
obtain an environmental parameter of an environment in which the terminal is located; and
either transmit the environmental parameter to a server, transmit the environmental parameter to another terminal, or transmit the environmental parameter to each of the server and to the other terminal.
20. The terminal of claim 13, wherein the operating instructions further cause the processor to be configured to stop playing the alarm tone when the lock screen state is canceled.
US15/540,863 2014-12-30 2014-12-30 Terminal anti-lost method and terminal Active US10129387B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/095605 WO2016106569A1 (en) 2014-12-30 2014-12-30 Method for preventing loss of terminal, and terminal

Publications (2)

Publication Number Publication Date
US20170346939A1 US20170346939A1 (en) 2017-11-30
US10129387B2 true US10129387B2 (en) 2018-11-13

Family

ID=56283848

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/540,863 Active US10129387B2 (en) 2014-12-30 2014-12-30 Terminal anti-lost method and terminal

Country Status (4)

Country Link
US (1) US10129387B2 (en)
EP (1) EP3229448B1 (en)
CN (1) CN105934933B (en)
WO (1) WO2016106569A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10038971B2 (en) * 2015-03-24 2018-07-31 International Business Machines Corporation Secure mobile device recovery
CN106506813A (en) * 2016-10-13 2017-03-15 深圳缪斯智能珠宝有限公司 A kind of anti-lost method of mobile terminal and mobile terminal
WO2018107331A1 (en) * 2016-12-12 2018-06-21 华为技术有限公司 Computer system and memory access technology
EP3567721A4 (en) 2017-01-25 2020-01-15 Huawei Technologies Co., Ltd. Power amplification device, radio remote unit, and base station

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1589044A (en) 2004-08-23 2005-03-02 大唐微电子技术有限公司 Digital mobile phone with anti-rob and tracking function and its anti-rob and tracking method
US20070213099A1 (en) * 2000-02-18 2007-09-13 Vtech Telecommunications Ltd. Mobile telephone with improved man machine interface
CN101772018A (en) 2010-01-21 2010-07-07 中兴通讯股份有限公司 Theft preventing mobile terminal and theft preventing method of mobile terminal
US20100207721A1 (en) 2009-02-19 2010-08-19 Apple Inc. Systems and methods for identifying unauthorized users of an electronic device
US20120084691A1 (en) * 2010-09-30 2012-04-05 Lg Electronics Inc. Mobile terminal and method of controlling a mobile terminal
CN102624982A (en) 2012-03-12 2012-08-01 戴小天 Antitheft method for mobile phone and application
CN102624988A (en) 2012-03-29 2012-08-01 惠州Tcl移动通信有限公司 Anti-theft alarm method based on mobile phone and mobile phone
WO2012153954A2 (en) 2011-05-11 2012-11-15 주식회사 씽크풀 Digital system and method for providing same
WO2013130338A1 (en) 2012-03-02 2013-09-06 Lookout, Inc. System and method for remotely-initiated audio communication
US20140007223A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Biometric Capture for Unauthorized User Identification
WO2014000605A1 (en) 2012-06-25 2014-01-03 中兴通讯股份有限公司 Touch screen terminal and alarm method thereof
CN104010088A (en) 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
US20150119018A1 (en) * 2012-05-08 2015-04-30 Zte Corporation Method and system for parameter configuration of mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841264A (en) * 2014-02-19 2014-06-04 小米科技有限责任公司 Method and device for protecting terminal equipment and terminal equipment

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070213099A1 (en) * 2000-02-18 2007-09-13 Vtech Telecommunications Ltd. Mobile telephone with improved man machine interface
CN1589044A (en) 2004-08-23 2005-03-02 大唐微电子技术有限公司 Digital mobile phone with anti-rob and tracking function and its anti-rob and tracking method
US20100207721A1 (en) 2009-02-19 2010-08-19 Apple Inc. Systems and methods for identifying unauthorized users of an electronic device
US20120244839A1 (en) 2010-01-21 2012-09-27 Zte Corporation Anti-theft mobile terminal and anti-theft method for mobile terminal
CN101772018A (en) 2010-01-21 2010-07-07 中兴通讯股份有限公司 Theft preventing mobile terminal and theft preventing method of mobile terminal
US20120084691A1 (en) * 2010-09-30 2012-04-05 Lg Electronics Inc. Mobile terminal and method of controlling a mobile terminal
WO2012153954A2 (en) 2011-05-11 2012-11-15 주식회사 씽크풀 Digital system and method for providing same
WO2013130338A1 (en) 2012-03-02 2013-09-06 Lookout, Inc. System and method for remotely-initiated audio communication
CN102624982A (en) 2012-03-12 2012-08-01 戴小天 Antitheft method for mobile phone and application
CN102624988A (en) 2012-03-29 2012-08-01 惠州Tcl移动通信有限公司 Anti-theft alarm method based on mobile phone and mobile phone
US20150119018A1 (en) * 2012-05-08 2015-04-30 Zte Corporation Method and system for parameter configuration of mobile terminal
WO2014000605A1 (en) 2012-06-25 2014-01-03 中兴通讯股份有限公司 Touch screen terminal and alarm method thereof
EP2866215A1 (en) 2012-06-25 2015-04-29 ZTE Corporation Touch screen terminal and alarm method thereof
US20140007223A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Biometric Capture for Unauthorized User Identification
CN104010088A (en) 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
Foreign Communication From a Counterpart Application, European Application No. 14909381.7, Extended European Search Report dated Nov. 10, 2017, 9 pages.
Foreign Communication From a Counterpart Application, PCT Application PCT/CN2014/095605, English Translation of International Search Report dated Sep. 30, 2015, 2 pages.
Foreign Communication From a Counterpart Application, PCT Application PCT/CN2014/095605, English Translation of Written Opinion dated Sep. 30, 2015, 6 pages.
Machine Translation and Abstract of Chinese Publication No. CN102624982, Aug. 1, 2012, 5 pages.
Machine Translation and Abstract of Chinese Publication No. CN102624988, Aug. 1, 2012, 9 pages.
Machine Translation and Abstract of Chinese Publication No. CN104010088, Aug. 27, 2014, 7 pages.
Machine Translation and Abstract of Chinese Publication No. CN1589044, Mar. 2, 2005, 8 pages.
Machine Translation and Abstract of International Publication No. WO2012153954, Nov. 15, 2012, 45 pages.
XP055192167 Openmoko,"Wishlist/Anti-Theft Mode", Mar. 10, 2010, 4 pages.

Also Published As

Publication number Publication date
US20170346939A1 (en) 2017-11-30
EP3229448A1 (en) 2017-10-11
WO2016106569A1 (en) 2016-07-07
EP3229448A4 (en) 2017-12-13
CN105934933A (en) 2016-09-07
EP3229448B1 (en) 2020-02-19
CN105934933B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
EP3163748B1 (en) Method, device and terminal for adjusting volume
EP2975821B1 (en) Network connection method and apparatus
EP3177077A1 (en) Method and device for network access
CN109219036B (en) Method and device for unbinding equipment and electronic equipment
EP3068115B1 (en) Incoming call identification
CN105389507B (en) The method and device of monitoring system partitioned file
EP3276910B1 (en) Bluetooth-based identity recognition method and device
EP3068154A1 (en) Method and apparatus for setting smart device management account
US10129387B2 (en) Terminal anti-lost method and terminal
US20100227605A1 (en) Control Of A Remote Mobile Device
US20170126423A1 (en) Method, apparatus and system for setting operating mode of device
CN107204883B (en) Network fault processing method and device
US20170034336A1 (en) Event prompting method and device
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
EP3016349A1 (en) Method and apparatus for verifying terminal and computer program product
US11507340B2 (en) Audio output method, electronic device, and storage medium
CN108650671B (en) Method, device, mobile terminal, storage medium and system for establishing Bluetooth connection
WO2017215151A1 (en) Method and device for automatically adjusting context-based mode
US11069332B2 (en) Interference generation
WO2017024550A1 (en) Anti-theft system and method for mobile terminal
US11775625B2 (en) Alert task processing method, terminal, and computer-readable storage medium
CN107911380B (en) Identity verification method and device
CN104899059B (en) Operating system update method and device
CN114756849B (en) Method and device for verifying personal identification number PIN code
US10019604B2 (en) Method and apparatus of verifying terminal and medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, ZHIHONG;CAI, MINGXING;REEL/FRAME:043850/0071

Effective date: 20170929

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4